From post

Computational Modelling Strategies for Gene Regulatory Network Reconstruction.

, , и . Computational Intelligence in Medical Informatics, том 85 из Studies in Computational Intelligence, Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Self and static interference mitigation scheme for coexisting wireless networks., , , и . Comput. Electr. Eng., 40 (2): 307-318 (2014)Collateral missing value imputation: a new robust missing value estimation algorithm for microarray data., , и . Bioinform., 21 (10): 2417-2423 (2005)Online Anomaly Detection over Live Social Video Streaming., , , , , и . CoRR, (2024)Social-connectivity-aware vertical handover for heterogeneous wireless networks., , и . J. Netw. Comput. Appl., 36 (4): 1131-1139 (2013)Wake-up timer and binary exponential backoff for ZigBee-based wireless sensor network for flexible movement control system of a self-lifting scaffold., , , , и . Int. J. Distributed Sens. Networks, (2016)How to Improve Postgenomic Knowledge Discovery Using Imputation., , , и . EURASIP J. Bioinform. Syst. Biol., (2009)Multi-Dimensional Adaptive SINR Based Vertical Handoff for Heterogeneous Wireless Networks., , и . IEEE Commun. Lett., 12 (6): 438-440 (2008)A Collimator Neural Network Model for the Classification of Genetic Data., , и . Advances in Bioinformatics and Its Applications, том 8 из Series in mathematical biology and medicine, World Scientific, (2005)Cyberattack triage using incremental clustering for intrusion detection systems., , , и . Int. J. Inf. Sec., 19 (5): 597-607 (2020)Abrasion Modeling of Multiple-Point Defect Dynamics for Machine Condition Monitoring., , , и . IEEE Trans. Reliab., 62 (1): 171-182 (2013)